Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-01-2025 09:00

General

  • Target

    80c912a1fa810ae218c565e963cfd6cbefd50ebbdab0fa8f9233a6fb84d4a8f4N.exe

  • Size

    204KB

  • MD5

    868582e6f68e39386be840e57a5487e0

  • SHA1

    4ab211bab613c38767875fc969bb034d72f10a03

  • SHA256

    80c912a1fa810ae218c565e963cfd6cbefd50ebbdab0fa8f9233a6fb84d4a8f4

  • SHA512

    cfec054f165655e94c8e6bc4633bc9c58ae8bd8a93a02cf31014c82829688147ebed39c5f1052936a15fa0d666c4516c92eb3976f1402617d560d0f7af665b02

  • SSDEEP

    3072:HFeODNAUrSqDMKKVILkt6i2ox7c39b1a0J86W8xXCKNWOHU/ezYMVWtG4SPUkxbu:HFeGpfMtboVBJtNWyPnYG4fUbu

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\80c912a1fa810ae218c565e963cfd6cbefd50ebbdab0fa8f9233a6fb84d4a8f4N.exe
    "C:\Users\Admin\AppData\Local\Temp\80c912a1fa810ae218c565e963cfd6cbefd50ebbdab0fa8f9233a6fb84d4a8f4N.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Windows Defender\gahyqah.com

    Filesize

    24KB

    MD5

    4751aa54c12741dfa9f049988cb8f324

    SHA1

    133f27081814143156be8e20d78eca606f6040be

    SHA256

    fd0d82ad53b30a420076938d764ea3243c59784be70e5fa5b26e571991f7d6c0

    SHA512

    c2d1aaca01c771e1934de3b32ea41ac68f62fbd577b974504638d0b3a44d42ab8df694f1390d698cc2bf674305fc78c3fda6d46d6743ddd8aaeac76dd0c1f695

  • C:\Program Files (x86)\Windows Defender\galyqaz.com

    Filesize

    42KB

    MD5

    576615e475c85110b9e4e2a9cc818647

    SHA1

    994a81f8e71eced73d2077c4a72d6df2821a9b38

    SHA256

    349ee498766846e5250fad2d701fafea290b831a6f571765c80503406ed6b04b

    SHA512

    5696aea776610520f460d7a13e820ceaa1ed8e57398fef8a0845c09efd13ab41d8c0f062cb96c583ffae24c7570f32b56e65ea4986a504bcd146b4f7d52db5e7

  • \Windows\AppPatch\svchost.exe

    Filesize

    204KB

    MD5

    2321d4e2af0df0950fc8d945dbc4968b

    SHA1

    490cfb8e13b7606e7ef2175d5213ba59707c7858

    SHA256

    d21083443311a27cd68a767e0adb07eabfe3eaa413b6afffd44dc0cf78681dfe

    SHA512

    bfc33a7391e993b3025313d8e22f0b4bbfce546189178121ef61f139a19a606abbb672cf2073417191b3349ff40340ba7ae15f48a71c68c49a6d75c7c59d156c

  • memory/1644-0-0x0000000000290000-0x00000000002DF000-memory.dmp

    Filesize

    316KB

  • memory/1644-1-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/1644-15-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/1644-17-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/1644-16-0x0000000000290000-0x00000000002DF000-memory.dmp

    Filesize

    316KB

  • memory/2460-18-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2460-19-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2460-20-0x0000000001E70000-0x0000000001F12000-memory.dmp

    Filesize

    648KB

  • memory/2460-30-0x0000000001E70000-0x0000000001F12000-memory.dmp

    Filesize

    648KB

  • memory/2460-28-0x0000000001E70000-0x0000000001F12000-memory.dmp

    Filesize

    648KB

  • memory/2460-26-0x0000000001E70000-0x0000000001F12000-memory.dmp

    Filesize

    648KB

  • memory/2460-24-0x0000000001E70000-0x0000000001F12000-memory.dmp

    Filesize

    648KB

  • memory/2460-22-0x0000000001E70000-0x0000000001F12000-memory.dmp

    Filesize

    648KB

  • memory/2460-31-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2460-32-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-34-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-36-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-39-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-44-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-54-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-69-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-68-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-73-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-83-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-84-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-82-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-81-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-80-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-79-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-78-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-77-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-76-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-75-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-74-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-72-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-71-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-70-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-67-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-66-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-65-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-64-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-63-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-62-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-61-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-60-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-59-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-58-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-57-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-56-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-55-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-53-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-52-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-51-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-50-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-49-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-48-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-47-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-46-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-45-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-38-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-43-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-42-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-41-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB

  • memory/2460-40-0x0000000001F60000-0x0000000002011000-memory.dmp

    Filesize

    708KB